cis 310 management information systems information security

52
CIS 310 Management Information Systems Information Security

Upload: mariah-cooper

Post on 23-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: CIS 310 Management Information Systems Information Security

CIS 310 Management Information Systems

Information Security

Page 2: CIS 310 Management Information Systems Information Security

Information Security

• An increasingly important issue today.• Global issue– Comment Crew– StuxNet

• Expensive for Companies – Symantec Study– Cyber crime costs US business $114 Billion/yr– “cybercrime costs the world significantly more

than the global black market in marijuana, cocaine and heroin combined ($288 billion)“

– Many companies do not report the crimes

Page 3: CIS 310 Management Information Systems Information Security

Recently…..

Page 4: CIS 310 Management Information Systems Information Security

Legislation on Cyber Crime

• Privacy Act (1974) – Restricts what information the federal government can collect and gives procedures for the government to secure the information. Forbids sharing the information without consent.

• Electronic Communications Privacy Act (1986) – Companies have the right to access all information on company computers, including email correspondence.

• Computer Fraud and Abuse Act (1986) – Makes unauthorized access of financial institutions via computers a crime.

Page 5: CIS 310 Management Information Systems Information Security

Legislation (contd.)

• Communications Assistance for Law Enforcement Act (1994) – Telecom equipment has to be designed so that government agencies with authorization can intercept the correspondence.

• Freedom of Information Act (1997-1998) - Allows for people to examine government records, unless it creates an invasion of privacy.

• HIPPA (1996) - Patient information needs to be confidential.

Page 6: CIS 310 Management Information Systems Information Security

Legislation (contd.)

• Patriot Act (2001 – 2003) – Allows law enforcement great freedom in access of electronic records related to purchasing and other information related to terrorist attacks.

• Homeland Security Act (2002) – Government agencies can mind data about individuals and groups .

• Sarbanes-Oxley Act (2002) – Requires companies to assure their information is accurate and reliable. Delineates what data should be kept for what periods of time.

• CAN-SPAM Act (2003) – Prohibits SPAM (unwanted advertising email) by limiting deceptive subjects lines, headers, addresses…etc.

Page 7: CIS 310 Management Information Systems Information Security

Global Issues

• Laws are different for each country.• Difficult to find the criminal.• Crimes:– Hacking– Software piracy– Intellectual property– Child pornography

Page 8: CIS 310 Management Information Systems Information Security

Cyber Crime Goes Social

• 11 percent of people have had their social account hacked. This year, the number is up to 15 percent.

• The total rate of cybercrime on social networks (more than simply a hacked account, but also including harassment, bullying, click- or like-jacking, and falling victim to scams) is 39 percent.

Page 9: CIS 310 Management Information Systems Information Security

Infamous Hackers

• John Draper – Capn’ Crunch. Phone Phreak.Found that a whistle from the cereal could be used to hack into AT&T for free calling. Got 5 years probation for toll fraud (1972).Later became a software developer and a CTO.

• Robert Tappan Morris – First Internet WormVirus propagated over the Internet.3 years probation and 10K fine.

Page 10: CIS 310 Management Information Systems Information Security

Infamous Hackers (contd.)

• David L. Smith – Melissa (1998)3/26/99 Shut down internet email because it created too much email traffic.10 years (served 20 months) and paid $5,000

• Kevin Mitnick – Unauthorized access to many computer systems.Notorious fugitive.Convicted twice.

Page 11: CIS 310 Management Information Systems Information Security

Infamous Hackers (contd.)

• Kevin Poulson – Hacked phone systemsto win prizes. Went on the run from the FBI. Convicted of mail, Wire and computer fraud and money laundering.4 years in prison and $60,000 fine.Currently an editor for Wired.com

• Onel de Guzman & Reomel Ramones. (2000, Love Bug or I Love You Virus).Virus sent by students in the Philippines. Two were arrested and then released because there are no laws against releasing a virus in the Philippines.

Page 12: CIS 310 Management Information Systems Information Security

Infamous Hackers (contd.)

• Aaron Swartz – Founder of Computing Commons and Reddit. Computer Activist.Accused of making journal articles (JSTOR) freely available to the public.Department of Justice arrested him for 13 counts of felony hacking. Committed suicide at the age of 26.

Page 13: CIS 310 Management Information Systems Information Security

End

• What was the name of the famous computer virus that infected Iranian nuclear facilities?

• What was the alias for John Draper, the phone service hacker who used the whistle?

• In what sense is cyber crime global?

Stuxnet

Cap’n Crunch

The internet is global. The laws for cyber crime are different for different countries.

Page 14: CIS 310 Management Information Systems Information Security

CIS 310 Management Information Systems

Attacks & Prevention

Page 15: CIS 310 Management Information Systems Information Security

Attacks & Prevention

• Hackers• Password Theft• Social Engineering• Phishing• Viruses/Trojan Horse/ Worm• Hoaxes• Elevation of Privilege• DOS Attack• Spyware

Page 16: CIS 310 Management Information Systems Information Security

Hackers

• Hacker– White Hat – Black Hat

• Hacktivist• Cyber-Terrorist• Groups– 2600– 4Chan/

Anonymous

CyberCrimeWatch.com• 25% cyber crime remain unresolved• 75 Million Scam Emails are sent

every day claiming 2,00 victims• 73% of Americans have experienced

some form of cyber crime and (65% globally) do the same.

• 10.5% of the world’s Hackers from the UK

• 66% of the world’s hackers are American

• 7.5% are Nigerian• The Average Internet Crime will cost

the Victim $ 128

Page 17: CIS 310 Management Information Systems Information Security

The Hacker Ethic

1. Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On imperative!

2. All information should be free. 3. Mistrust authority - promote decentralization. 4. Hackers should be judged by their hacking, not bogus

criteria such as degrees, age, race, or position. 5. You can create art and beauty on a computer. 6. Computers can change your life for the better.

Page 18: CIS 310 Management Information Systems Information Security

Passwords• Why Bother?• WIRED “Kill the Password: Why a String of Characters Can’t Protect Us

Anymore” 11/15/12• Passwords Vulnerabilities

– Easy to guess (password, 123456)– Easy to brute-force figure out (Cain and Abel, John the Ripper)– Super Reused – 50% of people– Phishing – emails asking you to divulge a password– Malware & Keylogger – software hidden on your computer that sends

information to hacker (Verizon says 69% of data breaches are from this)• Biometrics• PassPhrases• Two-factor authentication

Page 19: CIS 310 Management Information Systems Information Security

Social Engineering

• Talking your way into access to someone’s accounts.

• “Hello Jane, this is Ruth from IT. I see that you’ve got some stuck processes on the network. …..chat chat chatCan you just tell me what your password is and I’ll see if I can eliminate those and fix the problem.”

Page 20: CIS 310 Management Information Systems Information Security

WIRED tips on Password Selection• Don’t– Reuse passwords– Use a dictionary word as your password– Use standard number substitutions - P@ssw0rd– Use a short password

• Do– Use two-factor authentication– Give bogus answers to security questions– Scrub your online presence– Use a unique, secure, email when recovering a password.

Page 21: CIS 310 Management Information Systems Information Security

Phishing

Page 22: CIS 310 Management Information Systems Information Security
Page 23: CIS 310 Management Information Systems Information Security

Virus

• Program that attaches itself to other things (like email) and spreads to all the computers it connects with.

• Mellissa 1999 – David L. Smith• Trojan Horse – virus that lays hidden until a

specific time.• Worm – virus that eats through data,

destroying it or randomly writing over data or changing it.

Page 24: CIS 310 Management Information Systems Information Security

Hoax

Page 25: CIS 310 Management Information Systems Information Security

Elevation of Privilege

• Get higher access levels to computer systems.– Destroy information– Get confidential information

• Gain access by stealing passwords, social engineering, and other techniques.

Page 26: CIS 310 Management Information Systems Information Security

DOS Attacks

• Massive amount of traffic sent to a network so that it crashes.– Ping attack – sending so many pings that normal

network traffic cannot get through.– Teardrop attack – packets have malformed IP

addresses and overlaps of data. The network tries to reassemble them.

• Distributed DOS Attacks

Page 27: CIS 310 Management Information Systems Information Security

Spyware

• Program that is installed without your knowledge to spy on your computer activities.

• Tracks what you do: adware, cookies, keystrokes and shares it with others.

• Used to facilitate pop-up ads and sales.

Page 28: CIS 310 Management Information Systems Information Security

Spam

• Unwanted email• Not a virus but, a problem with email.– Takes your time– Uses your disk space

• Some estimates are as high as 45% of all email is spam.

• Spam blockers and filters help so that you don’t see those messages.

Page 29: CIS 310 Management Information Systems Information Security

Solutions

• Education• Authentication• Properly Maintained Systems• Firewall• Virus Protection Software• Network monitoring• Spam filters in eMail

Page 30: CIS 310 Management Information Systems Information Security

Education

• Ultimately, people are the first place that you can protect against computer crime.

• Education/training can prevent problems:– Password naming conventions– Antivirus– What email not to open– Secure data practices

Page 31: CIS 310 Management Information Systems Information Security

Authentication and Authorization

• Authentication refers to making sure people are who they say they are.1. Password

2. Access Card

3. Biometrics

• Authorization refers to ensuring that only authorized people have access to the data they need to see.

Page 32: CIS 310 Management Information Systems Information Security

Properly Maintained Networks

• Up to date software• Latest patches• Latest firewall• Latest anti-virus

Page 33: CIS 310 Management Information Systems Information Security

Firewall

• Software and/or Hardware that blocks bad things from entering an organizations computer system.

• Firewall has a set of rules it applies to block unwanted messages or attacks.

• You can set this on your own computer.• Companies have firewalls at every place that

their network connects to the Internet.

Page 34: CIS 310 Management Information Systems Information Security

Virus Protection Software

• Software that is specifically written to find and eradicate viruses from your machine.

• Companies update lists frequently.• Users need to run periodic scans to find and

eliminate problems.

Page 35: CIS 310 Management Information Systems Information Security

Content Filtering

• Software that blocks unwanted traffic.– Email messages with questionable content.– Time filtering to limit children’s time on the

computer.– Browser filtering, network filtering, ISP filtering.

• Criticism: censorship or over-filtering.• Libraries: free speech vs. preventing children

from viewing inappropriate sites.• Child’s Internet Protection Act (CIPA)• Pro: less spam, less ads in email.

Page 36: CIS 310 Management Information Systems Information Security

Network Monitoring

• Used to identify an attack on the network by watching traffic load and other variables.

Anti-SPAM Software• Stops junk mail from getting to you. • Deletes it or puts it in your SPAM folder.• Sometimes messages marked as SPAM

erroneously.

Page 37: CIS 310 Management Information Systems Information Security

End

• Is a worm a computer virus?

• What is the type of attack sends many messages to a Web site at the same time in an attempt to crash the site?

• Is it OK to use a password like P@ssw0rd?

Yes.

DOS Attack or Denial of Service Attack

Nope. Password cracking lists have these in them.

Page 38: CIS 310 Management Information Systems Information Security

CIS 310 Management Information Systems

Corporate Policiesand

Ethical Issues of the Information Age

Page 39: CIS 310 Management Information Systems Information Security

Scenarios for IT

• Browsing a company database to see what people’s salaries are.

• Taking company copies of software home for your own use.

• Using company email for private, non-work related, messages.

• Showing co-workers YouTube videos.• Playing computer games at work.• Copying confidential data onto a thumb drive.

Page 40: CIS 310 Management Information Systems Information Security

Policies

• Ethical Computer Use or Acceptable Use Policies– Agree not to use computer resources for unethical

activities.– Hate crimes– Adding unauthorized software– Agree not to use computer resources for unapproved

activities.– Games, movies…etc.

• Privacy Policies– Any place with sensitive data– Sign agreement to protect people’s privacy

Page 41: CIS 310 Management Information Systems Information Security

Cal Poly Appropriate Use Policy

Page 42: CIS 310 Management Information Systems Information Security

Workplace Monitoring

• Through cameras, computers and even RFID tags, employers can keep track of your activities.

• Usually people are informed about monitoring before they accept a job.

• Companies like to monitor productivity with metrics like how long it takes to close a customer call.

• Controversial because it is demeaning and shows a lack of trust.

Page 43: CIS 310 Management Information Systems Information Security

Security Policy

• All companies need security policies.

• Having a plan, in place, protects you from more damage or liability.

• Security Policies cover many things.

• Companies can tailor their security policies to fit their specific needs.

• Acceptable Use Policy• Authentication Policy• Backup Policy• Confidential Data Policy• Data Classification Policy• Encryption Policy• Email Policy• Guest Access Policy• Incident Response Policy• ‘Mobile Device Policy• Network Access Policy• Network Security policy• Outsourcing Policy• Password Policy• Physical Security policy• Remote Access Policy

List of Policies from InstantSecurityPolicy.com

Page 44: CIS 310 Management Information Systems Information Security

Security Audits

• Evaluate your environment, policies and people to see what your risks are.– Security Policy

• Does the company have a policy and is it periodically reviewed and updated?

– Organization of information security• Is management involved?• Is the policy disseminated?

– Asset Management• Are all the assets known/inventoried?• Do acceptable use polies exist?

Page 45: CIS 310 Management Information Systems Information Security

Security Audits (contd.)– HR Security

• Screen applicants for employment• Appropriate training• Disciplinary process

– Physical and Environmental Security• Locks, gates, access to specific people.• Secure, maintained, protected equipment.

– Etc.

• Communications and Operations Management• Access Control• Information Systems Acquisition, Development and Maintenance• Information Security Incident Management• Business Continuity Management• Compliance

Page 46: CIS 310 Management Information Systems Information Security

Ethical Issues of the Information Age

• Richard Mason, MISQ 1986, “Ethical Issues of the Information Age”– Privacy– Accuracy – Property– Access

Page 47: CIS 310 Management Information Systems Information Security

Privacy

• Two forces threatening our privacy:– Growth of IT and its ability to do surveillance,

communicate and retrieve and store information.– Increased value of information in decision-making.

Page 48: CIS 310 Management Information Systems Information Security

Accuracy

• The right to ensure data about you is accurate.• Erroneous data can create large problems to

individuals– Inaccurate medical records– Mistakes on a credit report– Bad driving directions

• Fixing an error, once it has occurred can be a problem.– Finding out the error exists– Making sure the error didn’t propagate to other databases.

Page 49: CIS 310 Management Information Systems Information Security

Property

• Intellectual Property• Copyrights, trademarks

and patents• Software Piracy• Business Software

Alliance

Page 50: CIS 310 Management Information Systems Information Security

Access

• Technology haves and have-nots.– Did refer to people without computers.– Now, people without skills is more of an issue.

• People need:– Intellectual skills to deal with information.– Infrastructure to access information– The information itself.

Page 51: CIS 310 Management Information Systems Information Security

End

• Is workplace monitoring legal?

• What are Mason’s 4 issues with the Information Age?

• What is the piracy rate in the United States according to the Business Software Alliance?

Yes. Typically it is.

Property, Accuracy, Privacy and Access

19%

Page 52: CIS 310 Management Information Systems Information Security

References• Sanger, David, et al, Chinese Army Unit is Seen as Tied to Hacking Against US, New

York Times, 2/18/13.• Asa, Norman, “Cyterattacks on Iran – Stuxnet and Flame”, New York Times, 8/9/12.• Statistics on Cyber Crime, http://

www.cybercrimeswatch.com/cyber-crime/cyber-crime-statistics.html• Wikipedia Articles on John Draper, Robert Morris, David Smith, Kevin Mitnick, Kevin

Poulson, Onel de Guzman and Aaron Swartz.• The Hacker’s Ethic• Honan, Mat, Kill the Password: Why a String of Characters Can’t Protect Us Anymore

, Wired, 11/15/12.• Spam statistics - http://www.spamlaws.com/spam-stats.html• McAfee.com and Symantec.com• 2011 Business Software Alliance Report on Piracy -

http://portal.bsa.org/globalpiracy2011/